CVE-2024-26687Incomplete Cleanup in Linux

Severity
5.5MEDIUMNVD
OSV7.0
EPSS
0.0%
top 94.42%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 3
Latest updateSep 18

Description

In the Linux kernel, the following vulnerability has been resolved: xen/events: close evtchn after mapping cleanup shutdown_pirq and startup_pirq are not taking the irq_mapping_update_lock because they can't due to lock inversion. Both are called with the irq_desc->lock being taking. The lock order, however, is first irq_mapping_update_lock and then irq_desc->lock. This opens multiple races: - shutdown_pirq can be interrupted by a function that allocates an event channel: CPU0 CPU1 shutdown_

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:HExploitability: 1.8 | Impact: 3.6

Affected Packages7 packages

Also affects: Debian Linux 10.0

Patches

🔴Vulnerability Details

20
OSV
linux-xilinx-zynqmp vulnerabilities2024-09-18
OSV
linux-oracle vulnerabilities2024-08-28
OSV
linux-azure, linux-azure-4.15 vulnerabilities2024-08-23
OSV
linux-aws, linux-aws-hwe vulnerabilities2024-08-22
OSV
linux, linux-aws, linux-kvm, linux-lts-xenial vulnerabilities2024-08-21

📋Vendor Advisories

20
Ubuntu
Linux kernel vulnerabilities2024-09-18
Ubuntu
Linux kernel (Oracle) vulnerabilities2024-08-28
Ubuntu
Linux kernel (Azure) vulnerabilities2024-08-23
Ubuntu
Linux kernel (AWS) vulnerabilities2024-08-22
Ubuntu
Linux kernel vulnerabilities2024-08-21

💬Community

1
Bugzilla
CVE-2024-26687 kernel: xen/events: close evtchn after mapping cleanup2024-04-03